Database Hacking: Common SQL Injection Commands

Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially one of the most serious and numerous attacks against web applications. In addition, these attacks usually involve serious financial damage to the companies and other institutions as they are attacks against the database, the repository of so […]

Continue Reading

Python Basics for Hackers, Part 5: Creating a Web Site Scraper to Find Potential Passwords

Welcome back, my aspiring cyberwarriors! Creating password lists is a key element of a successful password cracking strategy. In nearly every case, we need to provide a list of potential passwords to the password cracking tool whether it be hashcat, John the Ripper, BurpSuite, cameradar or others (the exception being a true brute force attack […]

Continue Reading

Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io

Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others’ are vulnerable to various known vulnerabilities and attacks. Whether a penetration tester, security engineer or other malicious actors, such information can be critical to the success of your mission. There are number of other websites that […]

Continue Reading